期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Correlation power attack on a message authentication code based on SM3
1
作者 Ye YUAN Kai-ge QU +2 位作者 Li-jiWU Jia-weiMA Xiang-min ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第7期930-946,共17页
Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel sec... Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel security of HMAC based on SM3(HMAC-SM3)is still to be evaluated,especially in hardware implementation,where only intermediate values stored in registers have apparent Hamming distance leakage.In addition,the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis.In this paper,a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation.Real attack experiments on a field programmable gate array(FPGA)board have been performed.Experimental results show that we can recover the key from the hypothesis space of 2256 based on the proposed procedure. 展开更多
关键词 HMAC-SM3 Side channel analysis correlation power attack Bit-wise chosen-plaintext
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部